{"id":"https://openalex.org/W3000597933","doi":"https://doi.org/10.1145/3371676.3371696","title":"Embedded Authentication and Blockchain in Micro-course","display_name":"Embedded Authentication and Blockchain in Micro-course","publication_year":2019,"publication_date":"2019-11-15","ids":{"openalex":"https://openalex.org/W3000597933","doi":"https://doi.org/10.1145/3371676.3371696","mag":"3000597933"},"language":"en","primary_location":{"id":"doi:10.1145/3371676.3371696","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3371676.3371696","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2019 9th International Conference on Communication and Network Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5076783927","display_name":"Wu-Chuan Yang","orcid":null},"institutions":[{"id":"https://openalex.org/I98298690","display_name":"I-Shou University","ror":"https://ror.org/04d7e4m76","country_code":"TW","type":"education","lineage":["https://openalex.org/I98298690"]}],"countries":["TW"],"is_corresponding":true,"raw_author_name":"Wu-Chuan Yang","raw_affiliation_strings":["Dept. of Information Engineering, I-Shou university, Kaohsiung, Taiwan"],"affiliations":[{"raw_affiliation_string":"Dept. of Information Engineering, I-Shou university, Kaohsiung, Taiwan","institution_ids":["https://openalex.org/I98298690"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5078313542","display_name":"Lien-Yuan Ting","orcid":null},"institutions":[{"id":"https://openalex.org/I98298690","display_name":"I-Shou University","ror":"https://ror.org/04d7e4m76","country_code":"TW","type":"education","lineage":["https://openalex.org/I98298690"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Lien-Yuan Ting","raw_affiliation_strings":["Dept. of Information Engineering, I-Shou university, Kaohsiung, Taiwan"],"affiliations":[{"raw_affiliation_string":"Dept. of Information Engineering, I-Shou university, Kaohsiung, Taiwan","institution_ids":["https://openalex.org/I98298690"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5076783927"],"corresponding_institution_ids":["https://openalex.org/I98298690"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.28028693,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"58","last_page":"62"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.994700014591217,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.994700014591217,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9902999997138977,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9843000173568726,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.7300792932510376},{"id":"https://openalex.org/keywords/certification","display_name":"Certification","score":0.715194821357727},{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.7063093185424805},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6795116662979126},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6734190583229065},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6374509930610657},{"id":"https://openalex.org/keywords/public-key-infrastructure","display_name":"Public key infrastructure","score":0.5624785423278809},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.559380292892456},{"id":"https://openalex.org/keywords/certificate-authority","display_name":"Certificate authority","score":0.4869157075881958},{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.4510835111141205},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.19530659914016724}],"concepts":[{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.7300792932510376},{"id":"https://openalex.org/C46304622","wikidata":"https://www.wikidata.org/wiki/Q374814","display_name":"Certification","level":2,"score":0.715194821357727},{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.7063093185424805},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6795116662979126},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6734190583229065},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6374509930610657},{"id":"https://openalex.org/C72648740","wikidata":"https://www.wikidata.org/wiki/Q658476","display_name":"Public key infrastructure","level":4,"score":0.5624785423278809},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.559380292892456},{"id":"https://openalex.org/C93636275","wikidata":"https://www.wikidata.org/wiki/Q196776","display_name":"Certificate authority","level":4,"score":0.4869157075881958},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.4510835111141205},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.19530659914016724},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3371676.3371696","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3371676.3371696","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2019 9th International Conference on Communication and Network Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":9,"referenced_works":["https://openalex.org/W1580300316","https://openalex.org/W2025172137","https://openalex.org/W2130783199","https://openalex.org/W2281564060","https://openalex.org/W2619630761","https://openalex.org/W4211068006","https://openalex.org/W4214654250","https://openalex.org/W6635059761","https://openalex.org/W6758647385"],"related_works":["https://openalex.org/W2994213367","https://openalex.org/W1968118562","https://openalex.org/W1612032142","https://openalex.org/W4313128548","https://openalex.org/W1915479549","https://openalex.org/W3013016046","https://openalex.org/W1494030766","https://openalex.org/W1000309336","https://openalex.org/W4386315167","https://openalex.org/W151108224"],"abstract_inverted_index":{"The":[0,45],"decentralization":[1],"and":[2,10,57,61,96,126,137,159,174,182],"consensus":[3],"of":[4,13,39,53,99,114,163,172],"blockchain":[5,66,173],"provide":[6],"the":[7,37,40,51,59,89,97,109,115,119,123,134,156,160,168],"network":[8],"trust":[9,60],"data":[11,121],"certification":[12,42,69,102,185],"a":[14,74,180],"low":[15],"cost.":[16],"In":[17,31,86,148],"addition":[18],"to":[19,128],"financial":[20],"technology,":[21,118],"it":[22,80],"has":[23],"also":[24],"attracted":[25],"widespread":[26],"attention":[27],"in":[28,43],"many":[29],"applications.":[30],"this":[32,87],"paper,":[33],"we":[34,107,153],"discuss":[35],"on":[36],"design":[38],"micro-course":[41,62,68,184],"university.":[44],"proposed":[46],"architecture":[47],"is":[48,81,92,103,122],"suitable":[49],"for":[50,83],"integration":[52],"school":[54],"information":[55],"systems":[56],"enhances":[58],"elective.":[63],"Unlike":[64],"general":[65],"applications,":[67],"must":[70],"be":[71,141],"provided":[72,143],"by":[73,144],"university-approved":[75],"teacher":[76],"or":[77],"staff,":[78],"thus":[79],"important":[82],"their":[84],"authentication.":[85],"application,":[88],"password":[90],"authentication":[91,177],"not":[93],"secure":[94,181],"enough,":[95],"cost":[98],"public":[100,111,130,146,175],"key":[101,112,157,176],"too":[104],"high.":[105],"Therefore,":[106],"use":[108],"authenticated":[110,120,135],"technology":[113],"RSA":[116,129,145,164],"system":[117],"predetermined":[124],"portion":[125],"embedded":[127],"key,":[131],"such":[132],"that":[133],"certifier":[136],"effective":[138],"period":[139],"can":[140,178],"directly":[142],"key.":[147],"comparison":[149],"with":[150],"traditional":[151],"RSA,":[152],"only":[154],"modified":[155],"generation":[158],"other":[161],"part":[162],"cryptosystem":[165],"are":[166],"all":[167],"same.":[169],"This":[170],"combination":[171],"achieve":[179],"easy-to-use":[183],"system.":[186]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
